A troublesome area is the management of the keys used for encryption and authentication.
一个麻烦的领域是用于加密和身份验证的密钥的管理。
"A comparison point is in the 1990s battles over encryption," said Kurt Opsahl, general counsel of the Electronic Frontier Foundation, a privacy watchdog group.
“可与之相比的就是20世纪90年代有关加密的争夺战,”库尔特·奥普萨尔说道,他是隐私监督组织电子前沿基金会的法律总顾问。
Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
XML Encryption offers various options.
xml加密提供各种选项。
XML Encryption implementation details.
xml加密实现细节。
Confidentiality is provided using encryption.
使用加密提供机密性。
It supports digital signatures and Encryption.
该语法支持数据签名和数据加密。
IBM NAS supports different types of encryption.
IBMNAS支持不同的加密类型。
The server's default behavior still uses encryption.
服务器的默认行为将仍然使用加密。
Reliable systems processing and commanding encryption.
可靠的系统处理和命令加密。
Encryption keys are configured as key Selection Rules.
加密密匙被配置为密匙选择规则。
Encryption 'LOW' corresponds to 64-bit DRDA encryption.
ENCRYPTION'LOW '对应于64位的drda加密。
Ask the vendor what encryption algorithm it is using.
请询问您的提供商它所使用的是哪种加密算法。
When everything works, modify your setup to use encryption.
一切就绪后,就可以修改您的设置来使用加密。
Network encryption can be achieved through SSL connections.
可以通过SSL连接实现网络加密。
They also support HDCP encryption for the newest HD content.
同时,它还支持最新的HDCP加密的高清内容。
XML Encryption provides a seamless solution to this problem.
xml加密对此问题提供了无缝的解决方案。
Authentication, encryption, nonrepudiation, and compression.
验证、加密、认可和压缩。
LTPA encryption keys are automatically changed at regular intervals.
LTPA加密密钥会定期自动进行更改。
What was the encryption type requested during authentication handshake?
在身份验证握手期间请求的加密类型。
There's an incremental impact of port encryption on system utilization.
端口加密对系统利用率的影响随用户数增大而增大。
The encryption used by secure websites relies on tenuous relationships.
安全网站使用的加密依赖脆弱的关系。
DES defines some keys to be weak and therefore not suitable for encryption.
DES定义了一些弱的、因而不适合用于加密的密钥。
Handlers can manage encryption and decryption, logging and auditing, and so on.
处理程序可以处理加密和解密、日志记录和审计等。
The encryption algorithm and the hash function are further grouped into CipherSpecs.
加密算法和散列函数被进一步分组到密码规范中。
Encryption Expert USES a hybrid encryption algorithm for encrypting database backup images.
EncryptionExpert对加密数据库备份映像使用混合的加密算法。
Network data encryption occurs if you enable the encryption on either side of a network connection.
只要在网络连接的某一端启用了加密,就会进行网络数据加密。
The combination of encryption algorithm and the key length governs the strength of the encryption type.
加密算法和密钥长度的组合决定加密类型的强度。
Use the encryption system initialization parameter to specify the level of encryption that CICS should use.
使用ENCRYPTION系统初始化参数指定CICS应使用的加密级别。
Encryption products checking, to control the export of cryptographic products containing strong encryption.
加密产品检查,以控制包含强加密的加密产品的出口。
应用推荐